Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
af2a6623d185dc0c0be24f8279d8eca0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af2a6623d185dc0c0be24f8279d8eca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
af2a6623d185dc0c0be24f8279d8eca0N.exe
-
Size
55KB
-
MD5
af2a6623d185dc0c0be24f8279d8eca0
-
SHA1
f280f1762586aaf5ca5859173d43c7d34b1492a6
-
SHA256
0d0d58f887caef456d26af8c53a30093d9e1b19e01ca5826e2f2ef8ce8e1592b
-
SHA512
67d0d37b778834cb39b00e9e7083be123c0a3291bcdae509ccc8a9650bb92cdcc6cd4a3d78f4615cc13d3028d4e8163197e2676a52fa7ed6ae5b9277ff2806d1
-
SSDEEP
768:pXiBWwQsWNMyGAkrf/5mX/6I/t7Ab0iUwx14WzRnWVrTdCgu3bqNf2p/1H5pXdnh:IBTQtMFAkrfa/6I43p85dCg042LJ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elhbodka.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elkoecin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gblmgmel.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hafccifn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecnaaofc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehjiiedj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gifedg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hppjpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkgnebjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibcogobo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpmdngln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hngggmgk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idieigdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eijfchlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcpjea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlfjdeme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlfjdeme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hldnofoh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffnfam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkphecpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcgpfqad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hblifphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eobepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Falqhj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmhnngnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delangck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkplfpnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihphofpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijqqqamh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfhihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggkbec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggnojc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iligje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daenhgfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgnbkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gopmqade.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gihbigkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hembhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iflobnlk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijndkaoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idieigdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diqcmjdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqoacfjk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqfgdedc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcdcqacf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpmmjeic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hifacjpd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifgaebcl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgiipqah.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfcllpdf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ionigpcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddanoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgdpea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmkkdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gihbigkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clappaon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgkffpoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqcfniha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjqdankl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dejdhg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgpjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpmmjeic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clappaon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elkoecin.exe -
Executes dropped EXE 64 IoCs
pid Process 3004 Cmjfielh.exe 2432 Clmfdb32.exe 2436 Cbgnaljp.exe 2224 Ciagnf32.exe 2608 Cpkokq32.exe 2676 Cfeggkpf.exe 2616 Cicccfoj.exe 3000 Clappaon.exe 2580 Copllmna.exe 2152 Dejdhg32.exe 2912 Dhhpdb32.exe 3064 Dkgmqn32.exe 2012 Dbndbkdh.exe 2864 Delangck.exe 2744 Dlfika32.exe 2396 Dmgebipf.exe 2376 Deoncfai.exe 1804 Ddanoc32.exe 2488 Dgpjko32.exe 2076 Dogbll32.exe 1140 Daenhgfm.exe 1680 Dgbgqned.exe 2340 Diqcmjdh.exe 1676 Dmlomh32.exe 560 Ddfgjbcn.exe 2272 Dcigfo32.exe 2184 Dkpogm32.exe 2236 Dmolch32.exe 2420 Epmhoc32.exe 1068 Eggpln32.exe 2980 Eielhi32.exe 2644 Eobepp32.exe 2788 Ecnaaofc.exe 2568 Ehjiiedj.exe 2092 Epaajcem.exe 1380 Ecpnfn32.exe 2932 Eijfchlm.exe 2868 Elhbodka.exe 2748 Eaejgkih.exe 1800 Elkoecin.exe 2928 Eoikaohb.exe 1984 Eeccnipo.exe 1972 Fgdpea32.exe 1952 Fkplfpnf.exe 2372 Fpmdngln.exe 1276 Fhdlodmp.exe 1472 Fgglka32.exe 584 Fjeigl32.exe 2148 Falqhj32.exe 2448 Falqhj32.exe 1776 Fdkmde32.exe 1644 Fgiipqah.exe 2664 Fkdeao32.exe 2528 Fncamk32.exe 2560 Flfaigpo.exe 2672 Fqanif32.exe 1708 Fcpjea32.exe 916 Fgkffpoe.exe 2320 Ffnfam32.exe 1492 Fnenbj32.exe 2900 Fmhnngnl.exe 264 Fqdjof32.exe 2300 Fofjjbmp.exe 2252 Fgnbkp32.exe -
Loads dropped DLL 64 IoCs
pid Process 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 3004 Cmjfielh.exe 3004 Cmjfielh.exe 2432 Clmfdb32.exe 2432 Clmfdb32.exe 2436 Cbgnaljp.exe 2436 Cbgnaljp.exe 2224 Ciagnf32.exe 2224 Ciagnf32.exe 2608 Cpkokq32.exe 2608 Cpkokq32.exe 2676 Cfeggkpf.exe 2676 Cfeggkpf.exe 2616 Cicccfoj.exe 2616 Cicccfoj.exe 3000 Clappaon.exe 3000 Clappaon.exe 2580 Copllmna.exe 2580 Copllmna.exe 2152 Dejdhg32.exe 2152 Dejdhg32.exe 2912 Dhhpdb32.exe 2912 Dhhpdb32.exe 3064 Dkgmqn32.exe 3064 Dkgmqn32.exe 2012 Dbndbkdh.exe 2012 Dbndbkdh.exe 2864 Delangck.exe 2864 Delangck.exe 2744 Dlfika32.exe 2744 Dlfika32.exe 2396 Dmgebipf.exe 2396 Dmgebipf.exe 2376 Deoncfai.exe 2376 Deoncfai.exe 1804 Ddanoc32.exe 1804 Ddanoc32.exe 2488 Dgpjko32.exe 2488 Dgpjko32.exe 2076 Dogbll32.exe 2076 Dogbll32.exe 1140 Daenhgfm.exe 1140 Daenhgfm.exe 1680 Dgbgqned.exe 1680 Dgbgqned.exe 2340 Diqcmjdh.exe 2340 Diqcmjdh.exe 1676 Dmlomh32.exe 1676 Dmlomh32.exe 560 Ddfgjbcn.exe 560 Ddfgjbcn.exe 2272 Dcigfo32.exe 2272 Dcigfo32.exe 2184 Dkpogm32.exe 2184 Dkpogm32.exe 2236 Dmolch32.exe 2236 Dmolch32.exe 2420 Epmhoc32.exe 2420 Epmhoc32.exe 1068 Eggpln32.exe 1068 Eggpln32.exe 2980 Eielhi32.exe 2980 Eielhi32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Eiakhe32.dll Hmmdhjlb.exe File opened for modification C:\Windows\SysWOW64\Iligje32.exe Iijknjlo.exe File created C:\Windows\SysWOW64\Aglehoan.dll Ifgaebcl.exe File created C:\Windows\SysWOW64\Hpgldk32.dll Gonqkafh.exe File created C:\Windows\SysWOW64\Dpnakc32.dll Heaodg32.exe File created C:\Windows\SysWOW64\Iligje32.exe Iijknjlo.exe File opened for modification C:\Windows\SysWOW64\Fgkffpoe.exe Fcpjea32.exe File opened for modification C:\Windows\SysWOW64\Ijndkaoj.exe Ihphofpg.exe File created C:\Windows\SysWOW64\Einefh32.dll Ecpnfn32.exe File created C:\Windows\SysWOW64\Flfaigpo.exe Fncamk32.exe File created C:\Windows\SysWOW64\Pggalnfm.dll Fgnbkp32.exe File created C:\Windows\SysWOW64\Ooncic32.dll Gichng32.exe File created C:\Windows\SysWOW64\Copllmna.exe Clappaon.exe File created C:\Windows\SysWOW64\Gcgpfqad.exe Gkphecpa.exe File created C:\Windows\SysWOW64\Fgglka32.exe Fhdlodmp.exe File created C:\Windows\SysWOW64\Fmhnngnl.exe Fnenbj32.exe File opened for modification C:\Windows\SysWOW64\Fjlogk32.exe Ffqcgmdm.exe File created C:\Windows\SysWOW64\Dbndbkdh.exe Dkgmqn32.exe File created C:\Windows\SysWOW64\Glgmancm.dll Hihnhjna.exe File opened for modification C:\Windows\SysWOW64\Ifgaebcl.exe Idieigdh.exe File created C:\Windows\SysWOW64\Ophagmnb.dll Eeccnipo.exe File opened for modification C:\Windows\SysWOW64\Injplp32.exe Ijndkaoj.exe File opened for modification C:\Windows\SysWOW64\Hfgego32.exe Hblifphg.exe File created C:\Windows\SysWOW64\Mmlfhnng.dll Hfgego32.exe File created C:\Windows\SysWOW64\Kppfndoh.dll Fnenbj32.exe File created C:\Windows\SysWOW64\Hgpkpc32.exe Heaodg32.exe File opened for modification C:\Windows\SysWOW64\Iefenj32.exe Imommm32.exe File opened for modification C:\Windows\SysWOW64\Dcigfo32.exe Ddfgjbcn.exe File opened for modification C:\Windows\SysWOW64\Fdkmde32.exe Fqoacfjk.exe File created C:\Windows\SysWOW64\Fnenbj32.exe Ffnfam32.exe File opened for modification C:\Windows\SysWOW64\Cmjfielh.exe af2a6623d185dc0c0be24f8279d8eca0N.exe File opened for modification C:\Windows\SysWOW64\Diqcmjdh.exe Dgbgqned.exe File created C:\Windows\SysWOW64\Ldoeaa32.dll Eobepp32.exe File opened for modification C:\Windows\SysWOW64\Ecpnfn32.exe Epaajcem.exe File created C:\Windows\SysWOW64\Fncamk32.exe Fkdeao32.exe File opened for modification C:\Windows\SysWOW64\Eobepp32.exe Eielhi32.exe File opened for modification C:\Windows\SysWOW64\Falqhj32.exe Fjeigl32.exe File created C:\Windows\SysWOW64\Gichng32.exe Gdhlni32.exe File created C:\Windows\SysWOW64\Ocmpmm32.dll Hckepcoj.exe File created C:\Windows\SysWOW64\Dbpaib32.dll Ddanoc32.exe File created C:\Windows\SysWOW64\Gonqkafh.exe Gkbdjc32.exe File created C:\Windows\SysWOW64\Fqldek32.dll Hifacjpd.exe File opened for modification C:\Windows\SysWOW64\Fkdeao32.exe Fgiipqah.exe File created C:\Windows\SysWOW64\Kkpqplbj.dll Gdhlni32.exe File opened for modification C:\Windows\SysWOW64\Gqajhi32.exe Gopmqade.exe File opened for modification C:\Windows\SysWOW64\Cfeggkpf.exe Cpkokq32.exe File opened for modification C:\Windows\SysWOW64\Ecnaaofc.exe Eobepp32.exe File created C:\Windows\SysWOW64\Ieobijnp.dll Fhdlodmp.exe File created C:\Windows\SysWOW64\Hnnnde32.dll Gfhihl32.exe File created C:\Windows\SysWOW64\Gcbcjdge.exe Gqcfniha.exe File created C:\Windows\SysWOW64\Abkedg32.dll Ijqqqamh.exe File created C:\Windows\SysWOW64\Gkikkbhg.exe Ggnojc32.exe File created C:\Windows\SysWOW64\Jjgiiale.dll Hnjdmm32.exe File created C:\Windows\SysWOW64\Dlfika32.exe Delangck.exe File opened for modification C:\Windows\SysWOW64\Dogbll32.exe Dgpjko32.exe File created C:\Windows\SysWOW64\Gfcpmlbj.exe Gbgcln32.exe File opened for modification C:\Windows\SysWOW64\Gkgnebjj.exe Ggkbec32.exe File created C:\Windows\SysWOW64\Mjolmhcl.dll Ddfgjbcn.exe File created C:\Windows\SysWOW64\Plfbfd32.dll Gbjpam32.exe File opened for modification C:\Windows\SysWOW64\Iechhjop.exe Ibellopm.exe File opened for modification C:\Windows\SysWOW64\Hngggmgk.exe Gkikkbhg.exe File created C:\Windows\SysWOW64\Delangck.exe Dbndbkdh.exe File opened for modification C:\Windows\SysWOW64\Gcgpfqad.exe Gkphecpa.exe File created C:\Windows\SysWOW64\Bpmqofpn.dll Gbqfbl32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2824 WerFault.exe 166 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbqfbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af2a6623d185dc0c0be24f8279d8eca0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkpogm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Falqhj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqfgdedc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcgpfqad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Copllmna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfcpmlbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imommm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idkbofbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbgcln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gblmgmel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gopmqade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmoqnijp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iefenj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgebipf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eielhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eeccnipo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgdpea32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqanif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gqajhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgpkpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfehao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hembhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hihnhjna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmolch32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flfaigpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddfgjbcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkphecpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gonqkafh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjqdankl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijndkaoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hppjpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmjfielh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnenbj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmmhif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hblifphg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iechhjop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eaejgkih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgkffpoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hafccifn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hifacjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihphofpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkgmqn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfhihl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hngggmgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gifedg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciagnf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpkokq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbgqned.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdkmde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkbdjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imommm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgpjko32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Diqcmjdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecnaaofc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffqcgmdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hckepcoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epaajcem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggnojc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmkkdg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggkbec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfgego32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejdhg32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eielhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abpbgaci.dll" Dcigfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggnojc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnenbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aonmce32.dll" Hfehao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqoacfjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jakdcibj.dll" Gbgcln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gihbigkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnjdmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acnjfo32.dll" Iameckcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igfjlfha.dll" Dgpjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eggpln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gifedg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldoeaa32.dll" Eobepp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elhbodka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkblnpbj.dll" Fpmdngln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcdimb32.dll" Dgbgqned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eobepp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqfgdedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqfgdedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghfcjg32.dll" Gcgpfqad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjolmhcl.dll" Ddfgjbcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecnaaofc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggieoddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecpnfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opdfemad.dll" Hblifphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbefoi32.dll" Dlfika32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmmdhjlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epaajcem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flfaigpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlbidb32.dll" Hcgled32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hblifphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eeccnipo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hihnhjna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iefenj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbgnaljp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njkjpani.dll" Hembhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifgaebcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID af2a6623d185dc0c0be24f8279d8eca0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gichng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqajhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apnpippl.dll" Cpkokq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eielhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggkbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkqdpg32.dll" Gkgnebjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deoncfai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjmkoenk.dll" Gbgcln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lknehgpj.dll" Hngggmgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpmmjeic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqldek32.dll" Hifacjpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deoncfai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgnbkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hafccifn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iggjfc32.dll" Idieigdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fofjjbmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pggalnfm.dll" Fgnbkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhpdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kppfndoh.dll" Fnenbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgnbkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iijknjlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciagnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkdeao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmkgal32.dll" Ggkbec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iijknjlo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3004 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 29 PID 1752 wrote to memory of 3004 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 29 PID 1752 wrote to memory of 3004 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 29 PID 1752 wrote to memory of 3004 1752 af2a6623d185dc0c0be24f8279d8eca0N.exe 29 PID 3004 wrote to memory of 2432 3004 Cmjfielh.exe 30 PID 3004 wrote to memory of 2432 3004 Cmjfielh.exe 30 PID 3004 wrote to memory of 2432 3004 Cmjfielh.exe 30 PID 3004 wrote to memory of 2432 3004 Cmjfielh.exe 30 PID 2432 wrote to memory of 2436 2432 Clmfdb32.exe 31 PID 2432 wrote to memory of 2436 2432 Clmfdb32.exe 31 PID 2432 wrote to memory of 2436 2432 Clmfdb32.exe 31 PID 2432 wrote to memory of 2436 2432 Clmfdb32.exe 31 PID 2436 wrote to memory of 2224 2436 Cbgnaljp.exe 32 PID 2436 wrote to memory of 2224 2436 Cbgnaljp.exe 32 PID 2436 wrote to memory of 2224 2436 Cbgnaljp.exe 32 PID 2436 wrote to memory of 2224 2436 Cbgnaljp.exe 32 PID 2224 wrote to memory of 2608 2224 Ciagnf32.exe 33 PID 2224 wrote to memory of 2608 2224 Ciagnf32.exe 33 PID 2224 wrote to memory of 2608 2224 Ciagnf32.exe 33 PID 2224 wrote to memory of 2608 2224 Ciagnf32.exe 33 PID 2608 wrote to memory of 2676 2608 Cpkokq32.exe 34 PID 2608 wrote to memory of 2676 2608 Cpkokq32.exe 34 PID 2608 wrote to memory of 2676 2608 Cpkokq32.exe 34 PID 2608 wrote to memory of 2676 2608 Cpkokq32.exe 34 PID 2676 wrote to memory of 2616 2676 Cfeggkpf.exe 35 PID 2676 wrote to memory of 2616 2676 Cfeggkpf.exe 35 PID 2676 wrote to memory of 2616 2676 Cfeggkpf.exe 35 PID 2676 wrote to memory of 2616 2676 Cfeggkpf.exe 35 PID 2616 wrote to memory of 3000 2616 Cicccfoj.exe 36 PID 2616 wrote to memory of 3000 2616 Cicccfoj.exe 36 PID 2616 wrote to memory of 3000 2616 Cicccfoj.exe 36 PID 2616 wrote to memory of 3000 2616 Cicccfoj.exe 36 PID 3000 wrote to memory of 2580 3000 Clappaon.exe 37 PID 3000 wrote to memory of 2580 3000 Clappaon.exe 37 PID 3000 wrote to memory of 2580 3000 Clappaon.exe 37 PID 3000 wrote to memory of 2580 3000 Clappaon.exe 37 PID 2580 wrote to memory of 2152 2580 Copllmna.exe 38 PID 2580 wrote to memory of 2152 2580 Copllmna.exe 38 PID 2580 wrote to memory of 2152 2580 Copllmna.exe 38 PID 2580 wrote to memory of 2152 2580 Copllmna.exe 38 PID 2152 wrote to memory of 2912 2152 Dejdhg32.exe 39 PID 2152 wrote to memory of 2912 2152 Dejdhg32.exe 39 PID 2152 wrote to memory of 2912 2152 Dejdhg32.exe 39 PID 2152 wrote to memory of 2912 2152 Dejdhg32.exe 39 PID 2912 wrote to memory of 3064 2912 Dhhpdb32.exe 40 PID 2912 wrote to memory of 3064 2912 Dhhpdb32.exe 40 PID 2912 wrote to memory of 3064 2912 Dhhpdb32.exe 40 PID 2912 wrote to memory of 3064 2912 Dhhpdb32.exe 40 PID 3064 wrote to memory of 2012 3064 Dkgmqn32.exe 41 PID 3064 wrote to memory of 2012 3064 Dkgmqn32.exe 41 PID 3064 wrote to memory of 2012 3064 Dkgmqn32.exe 41 PID 3064 wrote to memory of 2012 3064 Dkgmqn32.exe 41 PID 2012 wrote to memory of 2864 2012 Dbndbkdh.exe 42 PID 2012 wrote to memory of 2864 2012 Dbndbkdh.exe 42 PID 2012 wrote to memory of 2864 2012 Dbndbkdh.exe 42 PID 2012 wrote to memory of 2864 2012 Dbndbkdh.exe 42 PID 2864 wrote to memory of 2744 2864 Delangck.exe 43 PID 2864 wrote to memory of 2744 2864 Delangck.exe 43 PID 2864 wrote to memory of 2744 2864 Delangck.exe 43 PID 2864 wrote to memory of 2744 2864 Delangck.exe 43 PID 2744 wrote to memory of 2396 2744 Dlfika32.exe 44 PID 2744 wrote to memory of 2396 2744 Dlfika32.exe 44 PID 2744 wrote to memory of 2396 2744 Dlfika32.exe 44 PID 2744 wrote to memory of 2396 2744 Dlfika32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2a6623d185dc0c0be24f8279d8eca0N.exe"C:\Users\Admin\AppData\Local\Temp\af2a6623d185dc0c0be24f8279d8eca0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Cmjfielh.exeC:\Windows\system32\Cmjfielh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Clmfdb32.exeC:\Windows\system32\Clmfdb32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Cbgnaljp.exeC:\Windows\system32\Cbgnaljp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Ciagnf32.exeC:\Windows\system32\Ciagnf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Cpkokq32.exeC:\Windows\system32\Cpkokq32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Cfeggkpf.exeC:\Windows\system32\Cfeggkpf.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Cicccfoj.exeC:\Windows\system32\Cicccfoj.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Clappaon.exeC:\Windows\system32\Clappaon.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Copllmna.exeC:\Windows\system32\Copllmna.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Dejdhg32.exeC:\Windows\system32\Dejdhg32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\Dhhpdb32.exeC:\Windows\system32\Dhhpdb32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Dkgmqn32.exeC:\Windows\system32\Dkgmqn32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Dbndbkdh.exeC:\Windows\system32\Dbndbkdh.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Delangck.exeC:\Windows\system32\Delangck.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Dlfika32.exeC:\Windows\system32\Dlfika32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Dmgebipf.exeC:\Windows\system32\Dmgebipf.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\Deoncfai.exeC:\Windows\system32\Deoncfai.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Ddanoc32.exeC:\Windows\system32\Ddanoc32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1804 -
C:\Windows\SysWOW64\Dgpjko32.exeC:\Windows\system32\Dgpjko32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Dogbll32.exeC:\Windows\system32\Dogbll32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Windows\SysWOW64\Daenhgfm.exeC:\Windows\system32\Daenhgfm.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1140 -
C:\Windows\SysWOW64\Dgbgqned.exeC:\Windows\system32\Dgbgqned.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Diqcmjdh.exeC:\Windows\system32\Diqcmjdh.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\Dmlomh32.exeC:\Windows\system32\Dmlomh32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\Ddfgjbcn.exeC:\Windows\system32\Ddfgjbcn.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:560 -
C:\Windows\SysWOW64\Dcigfo32.exeC:\Windows\system32\Dcigfo32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Dkpogm32.exeC:\Windows\system32\Dkpogm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\Dmolch32.exeC:\Windows\system32\Dmolch32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\Epmhoc32.exeC:\Windows\system32\Epmhoc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Windows\SysWOW64\Eggpln32.exeC:\Windows\system32\Eggpln32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1068 -
C:\Windows\SysWOW64\Eielhi32.exeC:\Windows\system32\Eielhi32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Eobepp32.exeC:\Windows\system32\Eobepp32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2644 -
C:\Windows\SysWOW64\Ecnaaofc.exeC:\Windows\system32\Ecnaaofc.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Ehjiiedj.exeC:\Windows\system32\Ehjiiedj.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Epaajcem.exeC:\Windows\system32\Epaajcem.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Ecpnfn32.exeC:\Windows\system32\Ecpnfn32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Eijfchlm.exeC:\Windows\system32\Eijfchlm.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Elhbodka.exeC:\Windows\system32\Elhbodka.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\Eaejgkih.exeC:\Windows\system32\Eaejgkih.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\Elkoecin.exeC:\Windows\system32\Elkoecin.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Eoikaohb.exeC:\Windows\system32\Eoikaohb.exe42⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\Eeccnipo.exeC:\Windows\system32\Eeccnipo.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Fgdpea32.exeC:\Windows\system32\Fgdpea32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\Fkplfpnf.exeC:\Windows\system32\Fkplfpnf.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Fpmdngln.exeC:\Windows\system32\Fpmdngln.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Fhdlodmp.exeC:\Windows\system32\Fhdlodmp.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1276 -
C:\Windows\SysWOW64\Fgglka32.exeC:\Windows\system32\Fgglka32.exe48⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Fjeigl32.exeC:\Windows\system32\Fjeigl32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:584 -
C:\Windows\SysWOW64\Falqhj32.exeC:\Windows\system32\Falqhj32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Falqhj32.exeC:\Windows\system32\Falqhj32.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\Fqoacfjk.exeC:\Windows\system32\Fqoacfjk.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Fdkmde32.exeC:\Windows\system32\Fdkmde32.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\Fgiipqah.exeC:\Windows\system32\Fgiipqah.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\Fkdeao32.exeC:\Windows\system32\Fkdeao32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Fncamk32.exeC:\Windows\system32\Fncamk32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Flfaigpo.exeC:\Windows\system32\Flfaigpo.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Fqanif32.exeC:\Windows\system32\Fqanif32.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\Fcpjea32.exeC:\Windows\system32\Fcpjea32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\Fgkffpoe.exeC:\Windows\system32\Fgkffpoe.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\Ffnfam32.exeC:\Windows\system32\Ffnfam32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Fnenbj32.exeC:\Windows\system32\Fnenbj32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Fmhnngnl.exeC:\Windows\system32\Fmhnngnl.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Fqdjof32.exeC:\Windows\system32\Fqdjof32.exe64⤵
- Executes dropped EXE
PID:264 -
C:\Windows\SysWOW64\Fofjjbmp.exeC:\Windows\system32\Fofjjbmp.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\Fgnbkp32.exeC:\Windows\system32\Fgnbkp32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Ffqcgmdm.exeC:\Windows\system32\Ffqcgmdm.exe67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\Fjlogk32.exeC:\Windows\system32\Fjlogk32.exe68⤵PID:564
-
C:\Windows\SysWOW64\Fmkkdg32.exeC:\Windows\system32\Fmkkdg32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\Fqfgdedc.exeC:\Windows\system32\Fqfgdedc.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\Gcdcqacf.exeC:\Windows\system32\Gcdcqacf.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2960 -
C:\Windows\SysWOW64\Gbgcln32.exeC:\Windows\system32\Gbgcln32.exe72⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2988 -
C:\Windows\SysWOW64\Gbgcln32.exeC:\Windows\system32\Gbgcln32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Gfcpmlbj.exeC:\Windows\system32\Gfcpmlbj.exe74⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\Gialihan.exeC:\Windows\system32\Gialihan.exe75⤵PID:2504
-
C:\Windows\SysWOW64\Gmmhif32.exeC:\Windows\system32\Gmmhif32.exe76⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\Gkphecpa.exeC:\Windows\system32\Gkphecpa.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\Gcgpfqad.exeC:\Windows\system32\Gcgpfqad.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Gbjpam32.exeC:\Windows\system32\Gbjpam32.exe79⤵
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Gdhlni32.exeC:\Windows\system32\Gdhlni32.exe80⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\Gichng32.exeC:\Windows\system32\Gichng32.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\Gkbdjc32.exeC:\Windows\system32\Gkbdjc32.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\Gonqkafh.exeC:\Windows\system32\Gonqkafh.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\Gblmgmel.exeC:\Windows\system32\Gblmgmel.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\Gfhihl32.exeC:\Windows\system32\Gfhihl32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\Gifedg32.exeC:\Windows\system32\Gifedg32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Ggieoddc.exeC:\Windows\system32\Ggieoddc.exe87⤵
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Gopmqade.exeC:\Windows\system32\Gopmqade.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\Gqajhi32.exeC:\Windows\system32\Gqajhi32.exe89⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Gihbigkf.exeC:\Windows\system32\Gihbigkf.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Ggkbec32.exeC:\Windows\system32\Ggkbec32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Gkgnebjj.exeC:\Windows\system32\Gkgnebjj.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Gnejanim.exeC:\Windows\system32\Gnejanim.exe93⤵PID:2144
-
C:\Windows\SysWOW64\Gbqfbl32.exeC:\Windows\system32\Gbqfbl32.exe94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\Gqcfniha.exeC:\Windows\system32\Gqcfniha.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Gcbcjdge.exeC:\Windows\system32\Gcbcjdge.exe96⤵PID:2304
-
C:\Windows\SysWOW64\Ggnojc32.exeC:\Windows\system32\Ggnojc32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2364 -
C:\Windows\SysWOW64\Gkikkbhg.exeC:\Windows\system32\Gkikkbhg.exe98⤵
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\Hngggmgk.exeC:\Windows\system32\Hngggmgk.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\Hafccifn.exeC:\Windows\system32\Hafccifn.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Heaodg32.exeC:\Windows\system32\Heaodg32.exe101⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Hgpkpc32.exeC:\Windows\system32\Hgpkpc32.exe102⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\Hfcllpdf.exeC:\Windows\system32\Hfcllpdf.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2732 -
C:\Windows\SysWOW64\Hnjdmm32.exeC:\Windows\system32\Hnjdmm32.exe104⤵
- Drops file in System32 directory
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Hmmdhjlb.exeC:\Windows\system32\Hmmdhjlb.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Hcgled32.exeC:\Windows\system32\Hcgled32.exe106⤵
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Hfehao32.exeC:\Windows\system32\Hfehao32.exe107⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1244 -
C:\Windows\SysWOW64\Hjqdankl.exeC:\Windows\system32\Hjqdankl.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\Hmoqnijp.exeC:\Windows\system32\Hmoqnijp.exe109⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\Hpmmjeic.exeC:\Windows\system32\Hpmmjeic.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Hblifphg.exeC:\Windows\system32\Hblifphg.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1036 -
C:\Windows\SysWOW64\Hfgego32.exeC:\Windows\system32\Hfgego32.exe112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\Hifacjpd.exeC:\Windows\system32\Hifacjpd.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Hldnofoh.exeC:\Windows\system32\Hldnofoh.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2556 -
C:\Windows\SysWOW64\Hppjpd32.exeC:\Windows\system32\Hppjpd32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\Hckepcoj.exeC:\Windows\system32\Hckepcoj.exe116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\Hembhk32.exeC:\Windows\system32\Hembhk32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Hihnhjna.exeC:\Windows\system32\Hihnhjna.exe118⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Hlfjdeme.exeC:\Windows\system32\Hlfjdeme.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1248 -
C:\Windows\SysWOW64\Iflobnlk.exeC:\Windows\system32\Iflobnlk.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1996 -
C:\Windows\SysWOW64\Iijknjlo.exeC:\Windows\system32\Iijknjlo.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Iligje32.exeC:\Windows\system32\Iligje32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-